a story of a security...

18
A Story of A Security Professional A Story of A Security Professional MiSSConf (SP4.0) MiSSConf (SP4.0) March 31, 2018 March 31, 2018

Upload: others

Post on 22-Jan-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

A Story of A Security ProfessionalA Story of A Security ProfessionalMiSSConf (SP4.0)MiSSConf (SP4.0)

March 31, 2018March 31, 2018

Page 2: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

WhoAmI

● Lazy Blogger– Japan, Security, FOSS, Politics, Christian– http://narudomr.blogspot.com

● Information Security since 1995● Head of IT Security and Solution Architecture, Kiatnakin Bank● Consultant for OWASP Thailand Chapter● Committee Member, Cloud Security Alliance (CSA), Thailand

Chapter● Committee Member, National Digital ID Project, Technical

Team● Chief Information Security Officer (CISO) of the Year 2017,

NetworkWorld Asia

Page 3: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Enter the Digital World

Page 4: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Enter the Computer World

Page 5: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Information Security First Start

● In 1995, started working with Information and Telecommunication Services (ITS) → NETOne

● Business Development● Raptor Systems Inc’s

Eagle Firewall– The First Proxy Type

Firewall– Integration

● Sun OS, Windows NT● RSA SecureID● IPSec VPN

Page 6: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Internet Application Era

Page 7: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Embedded System Development

Page 8: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Embedded System Development

An Example of A Device Running with My Code

Page 9: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Solution Architect

Page 10: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Certification???

Page 11: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Security Operation and Data Analytics

BehaviorAnalysis

FunctionalAnalysis

StructuralAnalysis

Security PolicyDate/

Time/Source Match

System StatusSystem

Exposure

Vulnerability Database

Message Analysis

Intrusion Path

Alert Stats

www.cust1.comhack1.com

hack2.com

mail.cust1.comhack1.com

hack3.com

www.cust2.comhack2.com

hack3.com

hack1.comwww.cust1.com

mail.cust1.com

hack2.comwww.cust1.com

www.cust2.com

hack3.commail.cust1.com

www.cust2.com

Source &Target Correlation

ContextsContexts

Page 12: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Application Security

Page 13: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Turn from IT Vendors to an IT Consumer

Page 14: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

● Vendors’ Events● Technology Event Organizers’ Events

Social Contribution

Page 15: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

National Projects

Page 16: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Awards

Page 17: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental

Conclusion

● You may not know what technology will be in the next 10 years so the fundamental principles are essential much more than what you can do today.

● Every circumstances happen to your life are worthy, even good or bad, even you like or not. If you learn you can use them in the future.

● Teaching or sharing is the best way to sharpen your knowledge and skills but don’t use other people’s materials.

Page 18: A Story of A Security Professionalmiss.in.th/MiSSConf(SP4.0)/slide/KhunNarudom-MiSSConfSP4.pdfConclusion You may not know what technology will be in the next 10 years so the fundamental